
Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign.Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts.Public Report – Penumbra Labs R1CS Implementation Review.Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG.Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities.Real World Cryptography Conference 2023 – Part II.5G security – how to minimise the threats to a 5G network.SIAM AG23: Algebraic Geometry with Friends.Public Report – Entropy/Rust Cryptography Review.HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack.



Introduction to AWS Attribute-Based Access Control.Public Report – Caliptra Security Assessment.Public Report – Zcash FROST Security Assessment.Unveiling the Dark Side: A Deep Dive into Active Ransomware Families.Technical Advisory: Insufficient Proxyman HelperTool XPC Validation.Popping Blisters for research: An overview of past payloads and exploring recent developments.This is only captured when the extension runs from a Citrix VDA. In addition to the above metrics, the extension also captures user sessions and user actions based on the Citrix sessions. \Citrix Receiver for Web\Login attempts Calls Total \Citrix Receiver for Web\List resources Calls Total \Citrix Receiver for Web\Get icon Calls Total \Citrix Receiver for Web\Get Ica file Calls Total \Citrix Broker Service\Soft Registrations/sec \Citrix Broker Service\Registration Requests \Citrix Broker Service\Registration Rejects/sec \Citrix Broker Service\Hard Registrations/sec \Citrix Broker Service\Expired Registration/sec \Citrix Broker Service\Expired Launches/sec

\Citrix Broker Service\Database Transaction Errors/sec \Citrix Broker Service\Database Transactions/sec \Citrix Broker Service\Database Connected \Citrix Profile Management\Local Profile Setup Duration \Citrix Profile Management\Logon Duration
